CIS 4204 Ethical Hacking Fall, 2014

Size: px
Start display at page:

Download "CIS 4204 Ethical Hacking Fall, 2014"

Transcription

1 CIS 4204 Ethical Hacking Fall, 2014 Course Abstract: The purpose of this course is to provide a basic understanding of computing, networking, programming concepts, and exploitation techniques, as they relate to computer security. In security testing, an ethical hacker with legal permission attempts to penetrate a system or systems to find a weak link and then analyze ways to correct the security flaws. Ethical hacking relies on a combination of creativeness, expansion of knowledge based on best practices, legal issues, and client industry regulations as well as known threats and the breath of the target organization s security presence or point of risk. Outcomes of this course: General computer organization and architecture Ethical Hacking methodology Generalized exploit techniques Basic network concepts Networking vulnerabilities and countermeasures Class Format: Undergraduate course meeting online via Canvas. This class will be taught completely online. There will be a number of hands-on exercises using the tools of the trade and other freeware/shareware tools that may be acquired online. Professor: Contact Info/Office Hours: Shane Hartman me anytime at: shartman@sar.usf.edu.

2 Required reading: Hacking Exposed: Network Security Secrets and Solutions, 7 By: Stuart McClure, Joel Scambray, and George Kurtz ISBN: I will also refer to other books that are not required but useful for bolstering your overall knowledge of ethical hacking: I will make mention of them during class. Class Participation: Here is my official stance on the subject, as I have indicated to Student Advising: This course is to be taken asynchronously. Part of the student s grade is based on class participation, evaluations, and ability to do the work. Ethical hacking is a hands-on discipline. While there is a fair amount of information to be covered e.g., legal aspects, file systems, and network components most people learn this subject matter by being involved and engaged in activities. For this reason, this class will employ a number of hands-on exercises. Ways to get class participation credit: 1) Be online and participate 2) Provide articles and feedback on the class discussion board. Grading format: Class Participation 20% Hands-on exercises 20% Test 1 10% Midterm Exam 20% Test 2 10% Final Exam 20% Total 100% Please note these very important class rules: 1. Academic honesty is mandatory. Cheating on tests (which means giving help or receiving help from another student, or providing unattributed/plagiarized answers) is grounds for expulsion from the class and receiving a double F, which will brand your academic career in infamy forever. If you turn in work that references someone else s work and do not properly attribute it, this is plagiarism. It is also grounds for receiving a double F in the course. This includes downloading source code from the Internet. For example, if you borrow some script code to use in your project, and it is copyrighted, you may not remove the header information and insert your own as if it were original code. This is unethical and grounds for dismissal from the class. 2. Assignments are due by the beginning of class on the due date assigned. I will not accept any late assignments unless you have specifically made arrangements with me beforehand. For example, ing me at the end of the semester to request turning in all of your missed homework because you had some illness will not work.

3 3. Religious Observances: The University recognizes the right of students and faculty to observe major religious holidays. Students who anticipate the necessity of being absent from class for a major religious observance must provide notice of the date(s) to the instructor, in writing, by the second week of classes. 4. Disabilities Accommodation: Students are responsible for registering with the Office of Students with Disabilities Services (SDS) in order to receive academic accommodations. Reasonable notice must be given to the SDS office (typically 5 working days) for accommodations to be arranged. It is the responsibility of the student to provide the instructor with a copy of the official Memo of Accommodation. Contact Information: Pat Lakey, Coordinator, , plakey@sar.usf.edu, 5. Academic Disruption: The University does not tolerate behavior that disrupts the learning process. The policy for addressing academic disruption is included with Academic Dishonesty in the catalog: Occurrences of academic disruption will be addressed be the professor (depending on the situation, the student may be asked to leave or security may be called). Following the incident, the professor will establish with the student terms for continued course participation, and the professor will also submit a report to the dean. The consequences to the student can range from an administrative reprimand to suspension from USF. Most students are highly motivated to learn and do not need to be informed of these things, but the 5% or so that want to get a free grade without doing any work need to be made aware of these rules. If you do not think you can abide by these (in my opinion, completely reasonable) rules, please do not take this course! Canvas (MyUSF): All of our tests and assignments will be submitted via Canvas. Students needing instruction in using Canvas can use the following resources: Online tutorial: Technical toll-free Helpline: Live online help: Emergency Preparedness: It is strongly recommended that you become familiar with the USF Sarasota-Manatee Emergency Action Plan and of the Safety Preparedness site (800) Hotline: The USF hotline at 1 (800) is updated with pre-recorded information during an emergency. The hotline can also be operated by staff during an emergency if the situation necessitates that additional information, direction or resources need to be communicated and the personnel can be put in place in advance, such as in the event of a hurricane or ongoing emergency Fire Alarm Instructions: At the beginning of each semester please note the emergency exit maps posted in each classroom. These signs are marked with the primary evacuation route (red) and secondary evacuation route (orange) in case the building needs to be evacuated. Emergency Evacuation Procedures: Contingency Plans: In the event of continued natural disruption (e.g., significant hurricane damage to the area or a pandemic affecting the area), all instruction will be completely

4 carried out online on Canvas (as it is anyway for this course). There will be extended deadlines as appropriate for assignments. AcademicContinuity.pdf Drops: The last day to withdraw from class and receive no academic penalty is October 29 th. We will have had our first test by then so that you can gauge your progress. Important dates: September 2 th Labor Day November 11 th Veteran s Day November 28 th & 29 th - Thanksgiving December 2 nd Week for Classes December 9 rd 13 th Final Exams

5 Course Schedule (tentative, subject to change): Week 1 Introduction to Ethical Hacking Class Intro Hacking History Ethical Hacking Threats Week 2 TCP/IP Primer TCP IP UDP Packets 3 Way Handshake Week 3 Footprinting Gathering Information Whois Tracert and TTL Week 4 Scanning Test 1 Ping Sweeps Scanning Tools Port Scanning Week 5 Enumeration NetBIOS Active Directory SNMP Enumeration DNS Zone Transfer Week 6 Hacking Windows Privilege Escalation Cracking Passwords Data Execution Prevention Week 7 Hacking Unix Quest for Root Vulnerability Mapping Services Week 8 Network Devices and Hardware Mid-Term Discovery Fingerprinting Week 9 Hacking Code Buffer Overflows Input Validation Vulnerabilities Exploits

6 Week 10 Wireless Hacking Wireless Type Service Set Identifier (SSID) Wired Equivalent Protocol (WEP) Wireless Application Protocol (WAP) Week 11 Web Server Hacking and Web Application Vulnerabilities IIS Attacks Apache Attacks Spidering Week 12 SQL Injection Vulnerabilities Test 2 SQL Injection Testing and Attacks Types of Attacks SQL Injection Prevention and Remediation Week 13 Firewalls, Intrusion Detection Systems, and Honeypots Firewall Types and Configurations Intrusion Detection Systems (IDS) Honeypot Applications Week 14 Social Engineering Social Engineering Human-Based Social Engineering Computer-Based Social Engineering Identity Theft Week 15 Viruses, Worms, and Trojans Final Paper Due Viruses Spyware Spambots Worms Week 16 Final Exams

CTS 4348 Linux Administration Spring 2014

CTS 4348 Linux Administration Spring 2014 CTS 4348 Linux Administration Spring 2014 Course Abstract: This course provides the breadth and depth of material necessary to effectively implement and manage Linux servers in real world environments.

More information

USF Sarasota-Manatee CIS 4368 Database Security and Auditing Summer 2014. E-Mail: johncollins@sar.usf.edu Office Hours: By Appointment

USF Sarasota-Manatee CIS 4368 Database Security and Auditing Summer 2014. E-Mail: johncollins@sar.usf.edu Office Hours: By Appointment USF Sarasota-Manatee CIS 4368 Database Security and Auditing Summer 2014 Instructor: John Collins Office: N/A E-Mail: johncollins@sar.usf.edu Office Hours: By Appointment Canvas will be used in this class

More information

CIS 4203 IT Forensics & Investigations Summer C

CIS 4203 IT Forensics & Investigations Summer C CIS 4203 IT Forensics & Investigations Summer C Course Abstract: This course offers an introduction to system forensics investigation and response. Areas of study include procedures for investigating computer

More information

USF Sarasota-Manatee CIS 3615: Secure Software Development Spring 2014 Wednesdays 6:00 9:00 PM EST

USF Sarasota-Manatee CIS 3615: Secure Software Development Spring 2014 Wednesdays 6:00 9:00 PM EST USF Sarasota-Manatee CIS 3615: Secure Software Development Spring 2014 Wednesdays 6:00 9:00 PM EST Instructor: John Collins E-Mail: johncollins@sar.usf.edu Office: N/A Office Hours: By Appointment Canvas

More information

CGS 3850. Web Development: JavaScript

CGS 3850. Web Development: JavaScript Hospitality and Technology Leadership CGS 3850 Web Development: JavaScript Spring 2015 3 Credit Hours University of South Florida Sarasota/Manatee 8350 North Tamiami Trail, Sarasota, FL 34243 University

More information

CIS 3615 Secure Software Development

CIS 3615 Secure Software Development Information Technology CIS 3615 Secure Software Development Spring 2013 3 Credit Hours University of South Florida Sarasota/Manatee 8350 North Tamiami Trail, Sarasota, FL 34243 University of South Florida

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

SYLLABUS FALL 2015 PHI 3640 Environmental Ethics (A 100% Online Class) 3 credits (Subject to Revision and Canvas Posting with Notice)

SYLLABUS FALL 2015 PHI 3640 Environmental Ethics (A 100% Online Class) 3 credits (Subject to Revision and Canvas Posting with Notice) SYLLABUS FALL 2015 PHI 3640 Environmental Ethics (A 100% Online Class) 3 credits (Subject to Revision and Canvas Posting with Notice) Instructor: John A. Freeman, USFSM Environmental Science & Policy Program

More information

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus CSCI - 440 Network Security and Perimeter Protection 3-0-3 CATALOG DESCRIPTION This

More information

USF Sarasota-Manatee College of Business Information Technology CGS 2100 3 Credit Hours Computers in Business Fall 2015, USF Sarasota-Manatee

USF Sarasota-Manatee College of Business Information Technology CGS 2100 3 Credit Hours Computers in Business Fall 2015, USF Sarasota-Manatee USF Sarasota-Manatee College of Business Information Technology CGS 2100 3 Credit Hours Computers in Business Fall 2015, USF Sarasota-Manatee Instructor: Jonilda Bahja E-Mail: jonildabahja@usf.edu Mobile:

More information

CEH Version8 Course Outline

CEH Version8 Course Outline CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information

More information

CYBERTRON NETWORK SOLUTIONS

CYBERTRON NETWORK SOLUTIONS CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified

More information

Network Security ITP 457 (4 Units)

Network Security ITP 457 (4 Units) Network Security ITP 457 (4 Units) Description Objectives Prerequisites/ Recommended Preparation Instructor Contacting the Instructor Lecture Required Textbooks Web Site Due to the emergence of the internet

More information

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation

More information

CHIPOLA COLLEGE COURSE SYLLABUS Chipola s website: www.chipola.edu

CHIPOLA COLLEGE COURSE SYLLABUS Chipola s website: www.chipola.edu CHIPOLA COLLEGE COURSE SYLLABUS Chipola s website: www.chipola.edu COURSE TITLE: COURSE NUMBER: Introduction to Server and Network Security CIS 1352 COURSE DESCRIPTION (with prerequisites): This course

More information

University of South Florida Sarasota/Manatee Course Syllabus Fall 2015 (updated 082115)

University of South Florida Sarasota/Manatee Course Syllabus Fall 2015 (updated 082115) University of South Florida Sarasota/Manatee Course Syllabus Fall 2015 (updated 082115) Course Number: CIS 4510 Fall 2015 Classroom: Course Name: Learning Outcome: Instructor: Office Hours: Required Materials:

More information

ITSY-2459-8001 Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM

ITSY-2459-8001 Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM ITSY-2459-8001 Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM CATALOG DESCRIPTION: Capstone experience for the security curriculum.

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

UVic Department of Electrical and Computer Engineering

UVic Department of Electrical and Computer Engineering UVic Department of Electrical and Computer Engineering COURSE OUTLINE Elec 567 Advanced Network Security and Forensics Spring 2014 Instructor: Office Hours: Dr. Issa Traore Days: Monday, Thursday Phone:

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

University of South Florida Sarasota-Manatee Course Syllabus Forensic Accounting and Fraud Examination ACG 4931 Fall 2015

University of South Florida Sarasota-Manatee Course Syllabus Forensic Accounting and Fraud Examination ACG 4931 Fall 2015 Instructor: Liz Carlson, CPA, CFP, CFF, CVA Office: SMC 265 Phone: 941-359-4654 Fax: 941-359-4367 Cell Phone: 941-350-2792 Email: ecarlson@sar.usf.edu Office Hours: Wednesday and Thursday from 5:00 6:00

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) Course Number: CEH Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Exam 312 50: Certified Ethical Hacker Course Overview The

More information

McAfee Certified Assessment Specialist Network

McAfee Certified Assessment Specialist Network McAfee Certified Assessment Specialist Network Exam preparation guide Table of Contents Introduction 3 Becoming McAfee Certified 3 Exam Details 4 Recommended Exam Preparation 4 Exam Objectives 4 Sample

More information

University of South Florida Sarasota-Manatee Course Syllabus Forensic Accounting and Fraud Examination ACG 4931 Spring 2015

University of South Florida Sarasota-Manatee Course Syllabus Forensic Accounting and Fraud Examination ACG 4931 Spring 2015 Instructor: Liz Carlson, CPA, CFP, CFF, CVA Office: SMC 263 Phone: 941-359-4654 Fax: 941-359-4367 Cell Phone: 941-350-2792 Email: ecarlson@sar.usf.edu Office Hours: Monday, Wednesday and Thursday from

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 275 UNIX and Linux Security Management

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 275 UNIX and Linux Security Management RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 275 UNIX and Linux Security Management I. Basic Course Information A. Course Number & Title: CISY-275 - UNIX and Linux Security Management B. Date of

More information

Summer 2014 3 Credit Hours

Summer 2014 3 Credit Hours College of Hospitality and Technology Leadership CIS 4365 Computer Security Policies & Disaster Preparedness Summer 2014 3 Credit Hours University of South Florida Sarasota/Manatee 8350 North Tamiami Trail,

More information

Research Methods in Psychology

Research Methods in Psychology Research Methods in Psychology PSY 3213, section 522 Fall 2015 University of South Florida Sarasota/Manatee Instructor: Richard Reich, Ph.D. Office Hours: Mondays 12-2 & by appointment Meeting time: TBA;

More information

MW 515-545, TU 1-3; and other times by appointment

MW 515-545, TU 1-3; and other times by appointment CSUS, COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science CSC 154 - Computer System Attacks and Countermeasures/ C Sc 254 Network Security (MW 7-8:15p; RVR 1008), Fall 2013 Instructor:

More information

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

ITEC441- IS Security. Chapter 15 Performing a Penetration Test 1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and

More information

CRYPTUS DIPLOMA IN IT SECURITY

CRYPTUS DIPLOMA IN IT SECURITY CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information

More information

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2) Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2) Course number: CFED Length: 5 days Certification Exam This course will help you prepare for the following exams: CCE --

More information

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.

More information

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker ALL ElNis ONE CEH Certified Ethical Hacker EXAM GUIDE Matt Walker Mc Grain/ New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto McGraw-Hill

More information

[CEH]: Ethical Hacking and Countermeasures

[CEH]: Ethical Hacking and Countermeasures [CEH]: Ethical Hacking and Countermeasures Length Audience(s) Delivery Method : 5 days : This course will significantly benefit security officers, auditors, security professionals, site administrators,

More information

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 276 Windows Security Management

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 276 Windows Security Management RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 276 Windows Security Management I. Basic Course Information A. Course Number & Title: CISY-276 Windows Security Management B. Date of Revision: Spring

More information

EC Council Certified Ethical Hacker V8

EC Council Certified Ethical Hacker V8 Course Code: ECCEH8 Vendor: Cyber Course Overview Duration: 5 RRP: 2,445 EC Council Certified Ethical Hacker V8 Overview This class will immerse the delegates into an interactive environment where they

More information

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Professional Penetration Testing Techniques and Vulnerability Assessment ... Course Introduction Today Hackers are everywhere, if your corporate system connects to internet that means your system might be facing with hacker. This five days course Professional Vulnerability Assessment

More information

Build Your Own Security Lab

Build Your Own Security Lab Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers

More information

BACHELOR OF SCIENCE IN HOSPITALITY MANAGEMENT MISSION STATEMENT

BACHELOR OF SCIENCE IN HOSPITALITY MANAGEMENT MISSION STATEMENT USF Sarasota-Manatee College of Hospitality and Technology Leadership HFT 4945 3 Credit Hours Hospitality Leadership & Advanced Internship Spring Semester 2015, USF Sarasota-Manatee Instructor: Keith A.

More information

University of South Florida Sarasota-Manatee COURSE SYLLABUS

University of South Florida Sarasota-Manatee COURSE SYLLABUS University of South Florida Sarasota-Manatee COURSE SYLLABUS : MAN 4802 Entrepreneurship/Small Business Management 3 Credit Hours Fall 2015 The Facilitator: Jon C. Stuart, Bradenton, FL Email: jstuart2117@tampabay.rr.com

More information

CS 391-950 Ethical Hacking Spring 2016

CS 391-950 Ethical Hacking Spring 2016 CS 391-950 Ethical Hacking Spring 2016 Instructor: Shahriar Nick Rahimi Office: Faner 2136 Office Hours: MW 8:30 am-11 am Friday 10 am- 11 am E-Mail: nick@cs.siu.edu Course Web Site: https://online.siu.edu/

More information

CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS: CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS: I. INTRODUCTION A. Identify elements of firewall design, types of security threats and

More information

Learn Ethical Hacking, Become a Pentester

Learn Ethical Hacking, Become a Pentester Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,

More information

SONDRA SCHNEIDER JOHN NUNES

SONDRA SCHNEIDER JOHN NUNES TECHNOLOGY TRANSFER PRESENTS SONDRA SCHNEIDER JOHN NUNES CERTIFIED ETHICAL HACKER TM THE ONLY WAY TO STOP A HACKER IS TO THINK LIKE ONE MAY 21-25, 2007 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME

More information

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access The Best First for Beginners who want to become Penetration Testers PTSv2 in pills: Self-paced, online, flexible access 900+ interactive slides and 3 hours of video material Interactive and guided learning

More information

CS 464/564 Networked Systems Security SYLLABUS

CS 464/564 Networked Systems Security SYLLABUS CS 464/564 Networked Systems Security SYLLABUS College: College of Science Department: Department of Computer Science Syllabus Title: CS 464/564 Networked Systems Security Call Number: 1. Meet the Professor

More information

CIS 213 PENETRATION TESTING 3 cr. (2-2)

CIS 213 PENETRATION TESTING 3 cr. (2-2) JOHN A. LOGAN COLLEGE M. Rogers SP 15 CIS 213 PENETRATION TESTING 3 cr. (2-2) COURSE DESCRIPTION: This course teaches students the underlying principles and many of the techniques associated with the cybersecurity

More information

The Wall Street Journal, Barrons, and other financial news papers.

The Wall Street Journal, Barrons, and other financial news papers. University of South Florida Sarasota-Manatee College of Business Advanced Corporation Finance (FIN 4414, Section: 521) Class Meetings: A203B, Monday 2:00 P.M. 4:45 P.M. Fall 2015 Instructor: Kiyoung Chang,

More information

Course Title: Penetration Testing: Security Analysis

Course Title: Penetration Testing: Security Analysis Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced

More information

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led Course Description This class will immerse the student into an interactive environment where they will

More information

INFORMATION TECHNOLOGY EDUCATION PROGRAMMING & ANALYSIS COURSE SYLLABUS. Instructor: Debbie Reid. Course Credits: Office Location:

INFORMATION TECHNOLOGY EDUCATION PROGRAMMING & ANALYSIS COURSE SYLLABUS. Instructor: Debbie Reid. Course Credits: Office Location: Course Title and Number: Database Management with SQL, CGS2540 all sections Year and Term: Fall 2015 Office Phone: (352)395-4402 Meeting Time/Days: Sections 0M1/0M2: online Web Page Address: http://home.ite.sfcollege.edu/~debbie.reid

More information

https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting

https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests

More information

Description: Objective: Attending students will learn:

Description: Objective: Attending students will learn: Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of

More information

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification 1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer

More information

EC-Council Certified Security Analyst (ECSA)

EC-Council Certified Security Analyst (ECSA) EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for

More information

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun CSCI 454/554 Computer and Network Security Instructor: Dr. Kun Sun About Instructor Dr. Kun Sun, Assistant Professor of Computer Science http://www.cs.wm.edu/~ksun/ Phone: (757) 221-3457 Email: ksun@wm.edu

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY-274 Privacy, Ethics & Computer Forensics I. Basic Course Information A. Course Number & Title: CISY-274 - Privacy, Ethics, & Computer Forensics B. New

More information

Footprinting and Reconnaissance Tools

Footprinting and Reconnaissance Tools Footprinting and Reconnaissance Tools Topic 1: Common Port Scanning Techniques Do some research on computer ports that are most often scanned by hackers. Identify a port scanning exploit that is interesting

More information

Healthcare Information Security Governance and Public Safety II

Healthcare Information Security Governance and Public Safety II Healthcare Information Security Governance and Public Safety II Technical Track Seminar Agenda 8/26/2009 1 Vulnerability Assessment, Vulnerability Management and Penetration Testing PART 1 9:00 10:30 Anatomy

More information

Penetration Testing. Presented by

Penetration Testing. Presented by Penetration Testing Presented by Roadmap Introduction to Pen Testing Types of Pen Testing Approach and Methodology Side Effects Demonstration Questions Introduction and Fundamentals Penetration Testing

More information

Understanding Security Testing

Understanding Security Testing Understanding Security Testing Choosing between vulnerability assessments and penetration testing need not be confusing or onerous. Arian Eigen Heald, M.A., Ms.IA., CNE, CISA, CISSP I. Introduction Many

More information

Monfort College of Business Semester Course Syllabus (2015-2016) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed.

Monfort College of Business Semester Course Syllabus (2015-2016) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed. Monfort College of Business Semester Course Syllabus (2015-2016) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed. Cap: 40 CATALOG DESCRIPTION: Prerequisite: BACS 380 or consent of

More information

ITS425: Ethical Hacking and Penetration Testing

ITS425: Ethical Hacking and Penetration Testing ITS425: Ethical Hacking and Penetration Testing Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The

More information

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

CH ENSA EC-Council Network Security Administrator Detailed Course Outline CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical

More information

EC-Council. Certified Ethical Hacker. Program Brochure

EC-Council. Certified Ethical Hacker. Program Brochure EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed Venue Nairobi Kenya (exact hotel name to be confirmed before course) Dates March 31, 2014 April 4, 2014 Inovatec College Certified Ethical Hacker (CEH) boot camp The Certified Ethical Hacker (CEH) Certification

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system

More information

Page: Designed & Executed By: Presents Cyber Security Training

Page: Designed & Executed By: Presents Cyber Security Training Page: 1 Designed & Executed By: TM S I v8 RAINNVESTIGATOR Cyber Security Training Presents T CCE TechBharat Certified Cyber Expert TechBharat Certified Cyber Expert EC-Council Computer Hacking Forensic

More information

Exam 1 - CSIS 3755 Information Assurance

Exam 1 - CSIS 3755 Information Assurance Name: Exam 1 - CSIS 3755 Information Assurance True/False Indicate whether the statement is true or false. 1. Antiquated or outdated infrastructure can lead to reliable and trustworthy systems. 2. Information

More information

Design and Configuration of a Network Security and Forensics Lab

Design and Configuration of a Network Security and Forensics Lab Design and Configuration of a Network Security and Forensics Lab Billy Harris Billy-Harris@utc.edu Joseph Kizza Joseph-Kizza@utc.edu Mike Ward Mike-Ward@utc.edu ABSTRACT This paper describes the design

More information

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs Network Security Ola Lundh ola.lundh@hh.se Schedule/ time-table: landris.hh.se/ (NetwoSec) Course home-page: hh.se/english/ide/education/student/coursewebp ages/networksecurity cisco.netacad.net Packet

More information

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD)

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD) NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS COURSE IDENTIFICATION Course Code/Number: ETEC 275 Course Title: Computer and Network Security Division: Applied Science (AS) Liberal Arts (LA) Workforce

More information

ETHICAL HACKING. By REAL TIME FACULTY

ETHICAL HACKING. By REAL TIME FACULTY w w ẉ s u n m ar s ṣ n et ETHICAL HACKING Duration : 1 Month Timings : 4.30 p.m. to 6.00 p.m. By REAL TIME FACULTY # 407, 4 th Floor, New HUDA MYTHRI VIHAR, Beside Aditya Trade Centre, Ameerpet, Hyd. -

More information

Penetration Testing with Kali Linux

Penetration Testing with Kali Linux Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or

More information

Networking: EC Council Network Security Administrator NSA

Networking: EC Council Network Security Administrator NSA coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA

More information

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours Ethical Hacking and Information Security Duration Detailed Module Foundation of Information Security Lecture with Hands On Session: 90 Hours Elements of Information Security Introduction As technology

More information

Cisco Certified Security Professional (CCSP) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080

Cisco Certified Security Professional (CCSP) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080 COURSE SYLLABUS Cisco Certified Security Professional (CCSP) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080 Victoria Commons, 613 Hope Rd Building #5, Eatontown, NJ 07724 130 Clinton Rd, Fairfield,

More information

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.

More information

EC-Council. Program Brochure. EC-Council. Page 1

EC-Council. Program Brochure. EC-Council. Page 1 Program Brochure Page 1 Certified Ethical Hacker Version 7 Revolutionary Product releases the most advanced ethical hacking program in the world. This much anticipated version was designed by hackers and

More information

COURSE NUMBER AND TITLE: Management Information Systems Concepts

COURSE NUMBER AND TITLE: Management Information Systems Concepts (IS213ZA) (Management Information Systems Concepts) Page 1 EMPORIA STATE UNIVERSITY SCHOOL OF BUSINESS DEPARTMENT OF ACCOUNTING AND INFORMATION SYSTEMS Course Syllabus Fall 2012 MISSION STATEMENT: The

More information

This four (4) credit hour. Students will explore tools and techniques used penetrate, exploit and infiltrate data from computers and networks.

This four (4) credit hour. Students will explore tools and techniques used penetrate, exploit and infiltrate data from computers and networks. Integrated Science & Technology 457 Network Penetration and Attack Course Syllabus Spring 2014 MWF 10:00 10:50, W 12:00 12:50 Morrow Library 121 Instructor: Bill Gardner, Assistant Professor Office: 213

More information

Ethical Hacking Course Layout

Ethical Hacking Course Layout Ethical Hacking Course Layout Introduction to Ethical Hacking o What is Information Security? o Problems faced by the Corporate World o Why Corporate needs Information Security? Who is a Hacker? o Type

More information

642 552 Securing Cisco Network Devices (SND)

642 552 Securing Cisco Network Devices (SND) 642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,

More information

Hacking: Information Gathering and Countermeasures

Hacking: Information Gathering and Countermeasures Hacking: Information Gathering and Countermeasures Presenter: Chin Wee Yung Hacking: Content Hacking terminology History of hacking Information gathering and countermeasures Conclusion What is a Hacker?

More information

CSC 474 Information Systems Security

CSC 474 Information Systems Security CSC 474 Information Systems Security Introduction About Instructor Dr. Peng Ning, assistant professor of computer science http://www.csc.ncsu.edu/faculty/ning pning@ncsu.edu (919)513-4457 Office: Room

More information

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth

More information

How-to: DNS Enumeration

How-to: DNS Enumeration 25-04-2010 Author: Mohd Izhar Ali Email: johncrackernet@yahoo.com Website: http://johncrackernet.blogspot.com Table of Contents How-to: DNS Enumeration 1: Introduction... 3 2: DNS Enumeration... 4 3: How-to-DNS

More information

CHIPOLA COLLEGE COURSE SYLLABUS Chipola s website: www.chipola.edu

CHIPOLA COLLEGE COURSE SYLLABUS Chipola s website: www.chipola.edu CHIPOLA COLLEGE COURSE SYLLABUS Chipola s website: www.chipola.edu COURSE TITLE: COURSE NUMBER: Advanced Network Security CTS 2127 COURSE DESCRIPTION (with prerequisites): This course is a study of advanced

More information

BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can

BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can BBM 461: SECURE PROGRAMMING INTRODUCTION 1 Ahmet Burak Can COURSE MATERIAL Counter Hack Reloaded:A Step-by- Step Guide to Computer Attacks and Effective Defenses, Edward Skoudis, Tom Liston, Prentice Hall

More information

X 420.5 Network, Operating System, and Database Security. Fall 2014, Registration Number 249343W. UCLA EXTENSION: Computer Science.

X 420.5 Network, Operating System, and Database Security. Fall 2014, Registration Number 249343W. UCLA EXTENSION: Computer Science. X 420.5 Network, Operating System, and Database Security Fall 2014, Registration Number 249343W UCLA EXTENSION: Computer Science Course Syllabus 12 Sessions: Mondays, 6-9 pm, September 29 - December 15,

More information

Instructor: Michael A. Gillespie, Ph.D. Office Hours: M, W 11:00 to 12:00

Instructor: Michael A. Gillespie, Ph.D. Office Hours: M, W 11:00 to 12:00 University of South Florida Sarasota-Manatee Industrial and Organizational Psychology INP 4004 section 521 (Leadership & Ethics Pillar course) Fall 2015 v. 8/22/15 August 27 th December 9 th ; Mondays

More information

Internet Security and Acceleration Server 2000 with Service Pack 1 Audit. An analysis by Foundstone, Inc.

Internet Security and Acceleration Server 2000 with Service Pack 1 Audit. An analysis by Foundstone, Inc. Internet Security and Acceleration Server 2000 with Service Pack 1 Audit An analysis by Foundstone, Inc. Internet Security and Acceleration Server 2000 with Service Pack 1 Audit This paper presents an

More information

Course Content: Session 1. Ethics & Hacking

Course Content: Session 1. Ethics & Hacking Course Content: Session 1 Ethics & Hacking Hacking history : How it all begin Why is security needed? What is ethical hacking? Ethical Hacker Vs Malicious hacker Types of Hackers Building an approach for

More information

Texas A&M University Central Texas Network Administration CISK 476.110 Founder s Hall 312 Aug 24, 2015 Dec 11, 2015

Texas A&M University Central Texas Network Administration CISK 476.110 Founder s Hall 312 Aug 24, 2015 Dec 11, 2015 Instructor: Son Thai Office: Founder s Hall 113 Office Hours: M W [5:30PM 6:45PM] Phone: (254) 519-5702 Cell: (254) 368-4573 Email: son.thai@tamuct.edu Texas A&M University Central Texas Network Administration

More information

PROJECT MANAGEMENT MAN 4930

PROJECT MANAGEMENT MAN 4930 PROJECT MANAGEMENT MAN 4930 Section 591 CRN 94204 Fall, 2015 COURSE DESCRIPTION This course introduces the tasks and challenges fundamental to project management and managing complex projects across multiple

More information